In software testing, unit testing would test what?
A: The functionality of a specific section of code.
B: Interfaces between components against the software design.
C: Data handling passed between different units or subsystems.
D: Processes and security alerts when encountering errors.

A: Unit testing: Tests that verify the functionality of a specific section of code. In an object-oriented environment, this is usually at the class level, and the minimal unit tests include the constructors and destructors. Usually written by developers as they work on code (white-box), to ensure that the specific function is working as expected.

Attackers are using DDOS attacks on our organization using MAC flood, what does that attack do?
A: Opens many TCP sessions but never replies to the ACK from the host.
B: Sends many user datagram protocol packets.
C: Sends many ethernet frames, each with different media access control addresses,
D: Sends many IP addresses to a router.

C: An attacker sends multiple dummy Ethernet frames, each with a different MAC address, Network switches treat MAC addresses separately, and hence reserve some resources for each request. When all the memory in a switch is used up, it either shuts down or becomes unresponsive. In a few types of routers, a MAC flood attack may cause these to drop their entire routing table, thus disrupting the whole network under its routing domain.

When we apply standards and framework we can use tailoring to do what?
A: To implement the full standard or framework, but implement different standards in some areas.
B: To pick and chose which parts of the standard or framework we want to implement.
C: Find out how much the implementation will cost us.
D: To see if the standard is a good fit for our organization.

CBK 2: Asset Security
Source: ThorTeaches.com practice tests

Answer

A: Tailoring is customizing a standard to your organization. This could be we will apply this standard, but we use a stronger encryption (AES 256bit).

Bob wants to implement SSO for our internal applications, he wants to add a fingerprint reader to each work station for users to authenticate with. What is Bob implementing?
A: Super sign-on.
B: Secret sign-on.
C: Secure sign-on.
D: Single sign-on.

D: SSO (Single sign-on): Users use a single sign-on for multiple systems. Often deployed in organizations where users have to access 10+ systems, and they think it is too burdensome to remember all those passwords.